did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780131711297

Computer Security Fundamentals

by
  • ISBN13:

    9780131711297

  • ISBN10:

    0131711296

  • Format: Paperback
  • Copyright: 2005-03-03
  • Publisher: Prentice Hall
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $83.00

Summary

KEY BENEFIT: This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas including cyber terrorism, industrial espionage and encryption. Providing a comprehensive introduction, this volumes examines assessing a target system, denial of service attacks, malware, basics of assessing and securing a system, encryption, Internet fraud, and cyber crime, industrial espionage, cyber terrorism and information warfare, cyber detective, security hardware and software. For system analysts network administrators, network security professionals and security audit professionals.

Table of Contents

Series Walk-Through xiv
Preface xvii
About the Author xxi
Quality Assurance xxii
Introduction to Cyber Crime and Security
1(26)
Introduction
1(2)
How Seriously Should You Take Threats to Network Security?
3(2)
In Practice: Assessing Your Own System
5(1)
Identifying Types of Threats
6(3)
Malware
6(1)
Compromising System Security
7(1)
Denial of Service Attacks
8(1)
Common Attacks on Your Network
9(1)
Basic Security Terminology
10(4)
People
10(2)
Security Devices
12(1)
Activities
13(1)
Network Security Paradigms
14(2)
Perimeter Security
14(1)
Layered Security
14(1)
Proactive Versus Reactive
14(1)
Hybrid Security Methods
14(2)
How Do Legal issues Impact Network Security?
16(1)
Online Security Resources
17(10)
CERT
17(1)
Microsoft Security Advisor
18(1)
F-Secure
18(1)
SANS Institute
19(1)
Summary
20(1)
Test Your Skills
21(6)
Networks and the Internet
27(27)
Introduction
27(1)
The OSI Model
28(1)
Network Basics
29(7)
Media Access Control (MAC) Addresses
29(1)
DNS Servers
30(1)
The Physical Connection: Local Networks
30(3)
The Physical Connection: Internet
33(1)
Data Transmission
34(2)
How the Internet Works
36(2)
IP Addresses
36(2)
In Practice: Converting Binary Numbers
38(4)
Uniform Resource Locators
41(1)
Basic Network Utilities
42(4)
IPConfig
43(2)
Ping
45(1)
Tracert
46(1)
Other Network Devices
46(8)
Summary
47(1)
Test Your Skills
47(7)
Assessing a System
54(31)
Introduction
54(1)
Basic Reconnaissance
55(3)
Netcraft
56(1)
Tracing the IP Address
57(1)
In Practice: Using VisualRoute
58(6)
Using IP Registration Information
61(2)
Social Engineering
63(1)
Scanning
64(1)
Port Scanning
65(1)
In Practice: Using NetCop
65(10)
Vulnerability Scanning
73(2)
Port Monitoring and Managing
75(10)
NetStat Live
75(2)
Active Ports
77(1)
Fport
77(1)
TCPView
78(1)
In-Depth Searches
78(1)
Summary
79(1)
Test Your Skills
79(6)
Denial of Service Attacks
85(23)
Introduction
85(1)
Overview
85(1)
In Practice: Illustrating an Attack
86(4)
Common Tools Used for DoS
88(1)
DoS Weaknesses
89(1)
DoS Attacks
90(6)
TCP SYN Flood Attack
90(3)
Smurf IP Attack
93(1)
UDP Flood Attack
94(1)
ICMP Flood Attack
94(1)
The Ping of Death (PoD)
94(1)
Teardrop Attack
95(1)
Land Attack
95(1)
Echo/Chargen Attack
95(1)
Distributed Denial of Service (DDoS)
96(1)
Real-World Examples
97(2)
MyDoom
97(1)
Slammer
98(1)
How to Defend Against DoS Attacks
99(9)
Summary
101(1)
Test Your Skills
101(7)
Malware
108(26)
Introduction
108(1)
Viruses
109(5)
How a Virus Spreads
109(1)
Recent Virus Examples
110(3)
Rules for Avoiding Viruses
113(1)
Trojan Horses
114(1)
The Buffer Overflow Attack
115(1)
The Sasser Virus/Buffer Overflow
116(1)
Spyware
117(3)
Legal Uses of Spyware
117(1)
How Is Spyware Delivered to a Target System?
118(1)
Obtaining Spyware Software
118(2)
Other Forms of Malware
120(3)
Rootkit
121(1)
Malicious Web-Based Code
122(1)
Detecting and Eliminating Viruses and Spyware
123(11)
Antivirus Software
123(1)
Anti-Spyware Software
124(2)
Summary
126(1)
Test Your Skills
127(7)
Basics of Assessing and Securing a System
134(32)
Introduction
134(1)
Basics of Assessing a System
135(1)
Patch
135(1)
Ports
136(1)
In Practice: Shutting Down a Service in Windows
136(3)
In Practice: Port Filtering in Windows
139(3)
Protect
142(1)
In Practice: Finding a Firewall
142(5)
Policies
144(2)
Probe
146(1)
Physical
146(1)
Securing Computer Systems
147(7)
Securing an Individual Workstation
148(2)
Securing a Server
150(2)
Securing a Network
152(2)
Safe Web Surfing
154(1)
Getting Professional Help
155(11)
Summary
157(1)
Test Your Skills
158(8)
Encryption
166(23)
Introduction
166(1)
Cryptography Basics
167(1)
History of Encryption
167(4)
The Caesar Cipher
170(1)
In Practice: Converting to ASCII Code
171(6)
Multi-Alphabet Substitution
174(1)
Binary Operations
175(2)
Modern Methods
177(4)
Single-Key (Symmetric) Encryption
177(1)
Public-Key (Asymmetric) Encryption
178(2)
Legitimate Versus Fraudulent Encryption Methods
180(1)
Virtual Private Networks
181(8)
PPTP
181(1)
L2TP
182(1)
IPSEC
182(1)
Summary
183(1)
Test Your Skills
183(6)
Internet Fraud and Cyber Crime
189(30)
Introduction
189(1)
Internet Fraud
190(5)
Fraudulent Investment Offers
191(2)
Fraudulent Investment Advice
193(1)
Auction Frauds
194(1)
In Practice: Handling Online Investments
195(3)
Identity Theft
197(1)
In Practice: Credit Card Security
198(1)
Cyber Stalking
199(3)
Laws Concerning Cyber Crime
202(2)
Protecting Yourself Against Cyber Crime
204(2)
Protecting Against Investment Fraud
204(1)
Protecting Against Auction Fraud
204(1)
Protecting Against Identity Theft
205(1)
In Practice: Securing Browser Settings for Microsoft Internet Explorer
206(1)
In Practice: Securing Browser Settings for Netscape Navigator
207(12)
Protecting Against Cyber Stalking
209(2)
Summary
211(1)
Test Your Skills
211(8)
Industrial Espionage in Cyberspace
219(22)
Introduction
219(1)
What Is Industrial Espionage?
220(1)
In Practice: Leaving with Sensitive Data
221(1)
Information as an Asset
221(3)
How Does Espionage Occur?
224(3)
Low-Tech Industrial Espionage
225(2)
Spyware Used in Industrial Espionage
227(1)
Protecting Against Industrial Espionage
227(4)
Real-World Examples of Industrial Espionage
231(10)
Example 1: VIA Technology
231(1)
Example 2: General Motors
232(1)
Example 3: Interactive Television Technologies, Inc.
232(1)
Example 4: Bloomberg, Inc.
233(1)
Example 5: Avant Software
233(1)
Industrial Espionage and You
233(1)
Summary
234(1)
Test Your Skills
234(7)
Cyber Terrorism and Information Warfare
241(23)
Introduction
241(1)
Economic Attacks
242(3)
Military Operations Attacks
245(1)
General Attacks
246(1)
Information Warfare
246(4)
Propaganda
247(1)
Information Control
247(3)
Disinformation
250(1)
Actual Cases
250(4)
Future Trends
254(3)
Positive Trends
255(1)
Negative Trends
256(1)
Defense Against Cyber Terrorism
257(7)
Summary
258(1)
Test Your Skills
258(6)
Cyber Detective
264(18)
Introduction
264(2)
General Searches
266(3)
Court Records and Criminal Checks
269(5)
Sex Offender Registries
269(2)
Civil Court Records
271(1)
Other Resources
272(2)
Usenet
274(8)
Summary
275(1)
Test Your Skills
276(6)
Computer Security Hardware and Software
282(19)
Introduction
282(1)
Virus Scanners
283(2)
How Does a Virus Scanner Work?
283(1)
Virus-Scanning Techniques
284(1)
Commercial Antivirus Software
285(1)
Firewalls
285(6)
Firewall Types and Components
286(2)
How Firewalls Examine Packets
288(1)
Firewall Configurations
288(1)
Commercial and Free Firewall Products
289(2)
Firewall Logs
291(1)
Anti-Spyware
291(1)
Intrusion-Detection Software
291(10)
IDS Categorization
292(1)
IDS Approaches
293(2)
Commercial IDS Providers
295(1)
Summary
295(1)
Test Your Skills
295(6)
Appendix A: Computer Security Professionals: Education and Certifications 301(6)
Appendix B: Resources 307(4)
Appendix C: Sample Security Policy Documents and Checklists 311(16)
Glossary 327(6)
References 333(5)
Index 338

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program